Which of the following is the leading location-based mobile ad format?A) search adsB) display adsC) native/social adsD) video adsAnswer: A) search...
Google uses which of the following to build a global database of wireless access points and their geographic locations?
Google uses which of the following to build a global database of wireless access points and their geographic locations?A) E9-1-1B) Street View carsC)...
Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?
Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?A) local marketingB)...
Macy's deployed which of the following technologies in many of its retail stores in 2014?
Macy's deployed which of the following technologies in many of its retail stores in 2014?A) QR codesB) iBeaconC) E9-1-1D) Geo-searchAnswer: B) i...
Which of the following is the leading location-based marketer?
Which of the following is the leading location-based marketer?A) TwitterB) AppleC) FacebookD) GoogleAnswer: D) Goo...
Apple's iBeacon uses which of the following technologies?
Apple's iBeacon uses which of the following technologies?A) BLEB) NFCC) E9-1-1D) QR codesAnswer: A) ...
______ is the leading mobile retailer in the United States.
______ is the leading mobile retailer in the United States.A) WalmartB) AmazonC) GoogleD) QVCAnswer: B) Ama...
Which of the following technologies has Apple adopted in its hardware for Apple Pay?
Which of the following technologies has Apple adopted in its hardware for Apple Pay?A) GPSB) NFCC) BLED) QR codesAnswer: B) ...
Which of the following statements about BLE is not true?
Which of the following statements about BLE is not true?A) Only Apple iPhones can use BLE.B) BLE uses less power than traditional Bluetooth or GPS.C)...
According to a recent National Federation of Retailers survey, consumers are more likely to use tablets rather than smartphones for all of the following except:
According to a recent National Federation of Retailers survey, consumers are more likely to use tablets rather than smartphones for all of the following...
Around how many apps do users regularly use a month?
Around how many apps do users regularly use a month?A) 17B) 27C) 37D) 57Answer: B)...
In 2016, mobile marketing will be about ________% of all online marketing.
In 2016, mobile marketing will be about ________% of all online marketing.A) 25B) 55C) 65D) 75Answer: C)...
Which of the following accounts for the most mobile ad spending?
Which of the following accounts for the most mobile ad spending?A) display adsB) search engine advertisingC) video adsD) SMS text messagesAnswer: B)search...
Which of the following is not a major provider of mobile display advertising?
Which of the following is not a major provider of mobile display advertising?A) MoPubB) iAdC) AdMobD) WebtrendsAnswer: D) Webtre...
According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?
According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?A) around...
Which of the following accounts for the most time people spend using a mobile device?
Which of the following accounts for the most time people spend using a mobile device?A) watching videoB) social networksC) listening to musicD) reading...
How many retail-oriented apps are among the top 25 apps?
How many retail-oriented apps are among the top 25 apps?A) 1B) 2C) 3D) 4Answer: D)...
Which of the following statements is not true?
Which of the following statements is not true?A) Google is the leading display ad site on mobile devices.B) In 2016, Google is expected to generate almost...
Which of the following is the most popular use for mobile devices?
Which of the following is the most popular use for mobile devices?A) shoppingB) socializingC) entertainmentD) performing tasks, such as financesAnswer: C)...
Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?A)...
Which of the following is not true about mobile marketing?
Which of the following is not true about mobile marketing?A) Mobile marketing is the fastest growing form of online marketing.B) In 2016, spending on...
Which of the following is the top app in terms of both audience size and share of time spent?
Which of the following is the top app in terms of both audience size and share of time spent?A) YouTubeB) iTunesC) TwitterD) FacebookAnswer: D) ...
Which of the following allows a user to buy products directly on its site and pay with Apple Pay?
Which of the following allows a user to buy products directly on its site and pay with Apple Pay?A) TwitterB) LinkedInC) PinterestD) SnapchatAnswer: C)...
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
Which of the following involves using a variety of tools to encourage users to interact with content and brand?A) social densityB) engagementC) amplificationD)...
Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?A)...
Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?A) social...
Which of the following is a real-time bidding system that allows advertisers to target their ads to specific users based on personal information provided by Facebook?
Which of the following is a real-time bidding system that allows advertisers to target their ads to specific users based on personal information provided...
Which of the following is most similar to Pinterest?
Which of the following is most similar to Pinterest?A) LinkedInB) InstagramC) YouTubeD) TumblrAnswer: B) Instag...
Which social marketing proved the most effective for ExchangeHunterJumper.com?
Which social marketing proved the most effective for ExchangeHunterJumper.com?A) FacebookB) YouTubeC) PinterestD) InstagramAnswer: A) Faceb...
Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?
Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections...
Which of the following is not true about Facebook News Feed Page Post Ads?
Which of the following is not true about Facebook News Feed Page Post Ads?A) They have a tiny tag indicating that they are sponsored.B) They can be liked,...
Which of the following is a micro-blogging social network site that allows users to send and receive 140-character messages?
Which of the following is a micro-blogging social network site that allows users to send and receive 140-character messages?A) FacebookB) TwitterC) PinterestD)...
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.A) 8B) 10C) 13D) 16Answer: C)...
Which of the following was the object of the FTC's highest penalty for a COPPA violation to date?
Which of the following was the object of the FTC's highest penalty for a COPPA violation to date?A) Disney's PlaydomB) W3 InnovationC) SnapchatD) YelpAnswer: B)...
Which of the following is another term for amplification?
Which of the following is another term for amplification?A) impressionsB) reachC) conversation rateD) conversion ratioAnswer: B) re...
All of the following are examples of dark social except:
All of the following are examples of dark social except:A) e-mail.B) tweets.C) SMS texts.D) Snapchat.Answer: B) twe...
Facebook's share price fell dramatically after its IPO because investors feared that:
Facebook's share price fell dramatically after its IPO because investors feared that:A) Facebook's new marketing solutions would be difficult to monetize.B)...
Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?
Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?A) Open GraphB) Like buttonC)...
All of the following are Pinterest marketing tools except:
All of the following are Pinterest marketing tools except:A) Brand pages.B) Rich Pins.C) Promoted Pins.D) Promoted Accounts.Answer: D) Promoted ...
The number of people exposed to pins is a measure of which of the following?
The number of people exposed to pins is a measure of which of the following?A) engagementB) communityC) brand strengthD) fan acquisitionAnswer: D)...
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?A) TweetDeckB) CuralateC)...
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?A) Promoted TweetB) Promoted TrendC) Promoted...
Which of the following statements about Pinterest is not true?
Which of the following statements about Pinterest is not true?A) Pinned photos and photo boards are available to all Pinterest users.B) Pinterest users...
Which of the following are features of both Pinterest and Twitter?
Which of the following are features of both Pinterest and Twitter?A) tweetsB) hashtagsC) pinsD) Image Hover widgetAnswer: B) hasht...
Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?A) Enhanced...
The ratio of impressions to fans is a measure of:
The ratio of impressions to fans is a measure of:A) engagement.B) amplification.C) community.D) fan acquisition.Answer: D) fan acquisit...
All of the following marketing tools on Facebook require payment except:
All of the following marketing tools on Facebook require payment except:A) Brand Pages.B) Right-Hand Sidebar Ads.C) News Feed Page Post Ads.D) Mobile...
Which of the following statements is not true?
Which of the following statements is not true?A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the...
Which of the following is a history of your actions on Facebook?
Which of the following is a history of your actions on Facebook?A) News FeedB) TimelineC) TickerD) Open GraphAnswer: B) Timel...
How many hours a month does the average Facebook user spend on Facebook?
How many hours a month does the average Facebook user spend on Facebook?A) 8B) 18C) 28D) 38Answer: B)...
Ads that appear in a Facebook user's News Feeds are called:A) Marketplace Ads.B) Promoted Ads.C) Page Post Ads.D) Brand Ads.Answer: C) Page Post...
Which of the following statements about Facebook Exchange is not true?
Which of the following statements about Facebook Exchange is not true?A) It competes with DoubleClick.B) It allows advertisers to target ads.C) It is...
Facebook News Feeds include all of the following except:
Facebook News Feeds include all of the following except:A) status updates.B) app activity.C) Likes.D) tweets.Answer: D) twe...
Encouraging users to click a Like button is an example of which step in the social marketing process?
Encouraging users to click a Like button is an example of which step in the social marketing process?A) fan acquisitionB) brand strengthC) communityD)...
Which of the following is the first step in the social marketing process?
Which of the following is the first step in the social marketing process?A) communityB) amplificationC) fan acquisitionD) engagementAnswer: C) fan...
Which of the following is primarily known for blogs?
Which of the following is primarily known for blogs?A) FacebookB) TumblrC) GoogleD) InstagramAnswer: B) Tum...
By 2018, it is estimated that advertisers will be spending ________ on mobile marketing.
By 2018, it is estimated that advertisers will be spending ________ on mobile marketing.A) $70 millionB) $700 millionC) $7 billionD) $70 billionAnswer: D)...
The second most popular social network in terms of average minutes per visitor is:
The second most popular social network in terms of average minutes per visitor is:A) Instagram.B) Pinterest.C) LinkedIn.D) Tumblr.Answer: D) Tum...
Which of the following is not true about social marketing?
Which of the following is not true about social marketing?A) More than 50% of Twitter's ad revenues are generated by desktop users.B) The top seven social...
All of the following were popular types of online marketing before 2007 except:
All of the following were popular types of online marketing before 2007 except:A) e-mail.B) corporate websites.C) mobile marketing.D) display ads.Answer: C)...
Experience goods are
Experience goods area) Ones where you can learn all the important characteristics before buyingb) Ones where you can learn all the important characteristics...
Among the reasons marketing online is different from traditional marketing are
Among the reasons marketing online is different from traditional marketing area) Customer information can be captured more directly and in greater quantitiesb)...
Promotional pricing may be used when
Promotional pricing may be used whena) A product is an experience good and consumers need to be induced to try it outb) Consumers have switching costsc)...
Pull advertising refers to
Pull advertising refers toa) Advertising that pulls in the customerb) Advertising that exerts a strong appealc) Advertising that is pulled in by the consumer,...
Internet-based advertising methods include all of the following except:
Internet-based advertising methods include all of the following except:a) Paid listings with search servicesb) E-mail to customers and prospectsc) TV...
Options for copyright strategy in e-commerce include
Options for copyright strategy in e-commerce includea) Free distribution of limited copyrighted content for promotional purposesb) Lawsuits against possible...
A strategy of price discrimination can involve
A strategy of price discrimination can involvea) Bundlingb) Quantity discountsc) Versioningd) Any of the aboveAnswer: D) any of the ab...
Bundling is valuable for sellers when
Bundling is valuable for sellers whena) The willingness to pay for bundles is less dispersed than the willingness to pay for componentsb) It increases...
Vertical product differentiation refers to the case where
Vertical product differentiation refers to the case wherea) One version is not unanimously considered to be better than another, but rather the ranking...
Which of these is not an economic reason for product differentiation?
Which of these is not an economic reason for product differentiation?a) Matching consumer tastes betterb) Supporting open standardsc) Supporting price...
Which of the following is not a likely outcome of e-commerce?
Which of the following is not a likely outcome of e-commerce?a) Lower transaction costsb) Greater interactivity between buyers and sellersc) Guaranteed...
Stock trading by individuals became one of the earliest and most dramatic markets to be changed by the Internet and World Wide Web because
Stock trading by individuals became one of the earliest and most dramatic markets to be changed by the Internet and World Wide Web becausea) Financial...
Which of the following is not a reason for organizing and conducting transactions within firms rather than through markets
Which of the following is not a reason for organizing and conducting transactions within firms rather than through marketsa) Benefiting from complementarity...
Services become more important in e-commerce because
Services become more important in e-commerce becausea) Information is a shareable or non-rival goodb) Digital products are very durablec) Automation based...
Richness of information includes all of the following dimensions except:
Richness of information includes all of the following dimensions except:a) Customizationb) Interactivityc) Currency or timelinessd) CupidityAnswer: D)...
It may be difficult to sustain perfect competition for digital products because they may
It may be difficult to sustain perfect competition for digital products because they maya) Be shareableb) Be non-excludablec) Be easy to customize, leading...
Digital products include
Digital products includea) Contentb) Tokens of exchangec) Processes and servicesd) All of the aboveAnswer: D) all of the ab...
Words, names, and symbols used by manufacturers and businesses to identify their goods and services are covered by
Words, names, and symbols used by manufacturers and businesses to identify their goods and services are covered bya) Trademark lawb) Trade secret lawc)...
Information flows in e-commerce are different from traditional markets because
Information flows in e-commerce are different from traditional markets becausea) The costs of transmitting information are lowerb) Communications with...
The extent to which intermediaries operate, and the range of their functions depend on
The extent to which intermediaries operate, and the range of their functions depend ona) Economies of scopeb) Economies of scalec) Economies of specializationd)...
Which of the following statements is least accurate?
Which of the following statements is least accurate?a) Online exchanges and similar intermediaries provide matching servicesb) Matching can involve buyers...
Which of the following statements is most accurate?
Which of the following statements is most accurate?a) Reputation is less important in e-commerce than in traditional market transactionsb) Intermediaries...
E-commerce changes the physical organization of markets by allowing
E-commerce changes the physical organization of markets by allowinga) Greater spatial separationb) More rapid adjustmentc) More complex forms of organizationd)...
Which price determination rule for markets has become more common as a result of the Internet and Web?
Which price determination rule for markets has become more common as a result of the Internet and Web?a) Bargainingb) Negotiationc) Posted pricesd) AuctionsAnswer: D)...
Value chains are
Value chains area) A stylized listing of the sequence of activities performed by a firmb) Sometimes reconfigured or reshaped as a result of e-commercec)...
Which of the following measures the percentage of customers who purchase once, but never return within a year?
Which of the following measures the percentage of customers who purchase once, but never return within a year?A) retention rateB) attrition rateC) loyalty...
Which of the following is the most meaningful metric for video ads?
Which of the following is the most meaningful metric for video ads?A) view timeB) click-through rateC) completion rateD) skip rateAnswer: C) completion...
Which of the following measures the percentage of e-mails that could not be delivered?
Which of the following measures the percentage of e-mails that could not be delivered?A) abandonment rateB) unsubscribe rateC) bounce-back rateD) attrition...
Which of the following measures the ratio of items purchased to product views?
Which of the following measures the ratio of items purchased to product views?A) conversion rateB) cart conversion rateC) browse-to-buy ratioD) view-to-cart...
Conversion rate is a measure of the:
Conversion rate is a measure of the:A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.B)...
Recency refers to the:
Recency refers to the:A) percentage of customers who do not return during the next year after an initial purchase.B) time elapsed since the last visit...
Acquisition rate is a measure of the:
Acquisition rate is a measure of the:A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.B)...
Which of the following measures the average length of stay at a website?
Which of the following measures the average length of stay at a website?A) loyaltyB) stickinessC) page viewsD) retention rateAnswer: B) stickin...
eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following?
eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following?A) the total number of impressionsB) the total number...
Purchasing an online ad on a CPA basis means that the advertiser:
Purchasing an online ad on a CPA basis means that the advertiser:A) pays for impressions in 1,000 unit lots.B) pays a pre-negotiated fee for each click...
Hits are a measure of the:
Hits are a measure of the:A) number of times an ad is clicked.B) number of times an ad is served.C) number of HTTP requests.D) number of pages viewed.Answer: C)...
Uber has been criticized for using which of the following?
Uber has been criticized for using which of the following?A) flash marketingB) bundlingC) surge pricingD) freemiumAnswer: C) surge pric...
View-through rate measures the ________ response rate to an ad.
View-through rate measures the ________ response rate to an ad.A) 30-minuteB) 24-hourC) 7-dayD) 30-dayAnswer: D) 30-...
Impressions are a measure of the:
Impressions are a measure of the:A) number of times an ad is clicked.B) number of times an ad is served.C) number of http requests.D) number of pages...
If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be:
If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be:A) page views.B) unique...
To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.
To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.A) query-drivenB) customer...
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.A) long tail...
A ________ is a repository of customer information that records all of the contacts a customer has with a firm, and generates a customer profile that is available to appropriate individuals in the firm.
A ________ is a repository of customer information that records all of the contacts a customer has with a firm, and generates a customer profile that...
______ is an industry-standard database query and manipulation language.
______ is an industry-standard database query and manipulation language.A) SQLB) PHPC) DBMSD) JSPAnswer: A) ...
A web beacon is:
A web beacon is:A) a cookie that carries a virus.B) an executable cookie.C) an automated applet for performing web searches.D) a tiny graphics file embedded...
All of the following statements about cookies are true except:
All of the following statements about cookies are true except:A) cookies can be used to create cross-site profiles of users.B) the data typically stored...
For a website that has 1 million visitors a month, and where, on average, a visitor makes five page requests per visit, there will be ________ entries in the transaction log each month.
For a website that has 1 million visitors a month, and where, on average, a visitor makes five page requests per visit, there will be ________ entries...
The richness made possible by e-commerce technologies does which of the following?
The richness made possible by e-commerce technologies does which of the following?A) It reduces the cost of delivering marketing messages and receiving...
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed?
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered...
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?A) ubiquityB)...
Which of the following statements about the Internet's impact on marketing is not true?
Which of the following statements about the Internet's impact on marketing is not true?A) The Internet has broadened the scope of marketing communications.B)...
Which of the following would you use as a framework for working with your company's big data sets?
Which of the following would you use as a framework for working with your company's big data sets?A) data warehouseB) HadoopC) SQLD) profilingAnswer: B)...
Which of the following is an automated, auction-based method for matching supply and demand for online display ads?
Which of the following is an automated, auction-based method for matching supply and demand for online display ads?A) retargetingB) behavioral targetingC)...
Which of the following statements about native advertising is not true?
Which of the following statements about native advertising is not true?A) Native advertising is controversial.B) Native advertising is a new form of advertising...
Which of the following industries accounts for the highest percentage of spending on online advertising?
Which of the following industries accounts for the highest percentage of spending on online advertising?A) financial servicesB) retailC) automotiveD)...
Which of the following is based on the idea of complete price transparency in a perfect information marketplace?
Which of the following is based on the idea of complete price transparency in a perfect information marketplace?A) the Law of One PriceB) dynamic pricingC)...
Google's AdSense is an example of which of the following?
Google's AdSense is an example of which of the following?A) context advertisingB) SEOC) programmatic advertisingD) viral marketingAnswer: A) context...
Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?
Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?A) affiliate marketingB)...
All of the following are fixed price strategies except:
All of the following are fixed price strategies except:A) bundling.B) versioning.C) free pricing.D) yield management.Answer: D) yeild managem...
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
Creating multiple variations of information goods and selling these to different market segments at different prices is called:A) bundling.B) customization.C)...
Which of the following statements about a free pricing strategy is false?
Which of the following statements about a free pricing strategy is false?A) Free products and services can knock out potential and actual competitors.B)...
The incremental cost of building the next unit of a good is called the:
The incremental cost of building the next unit of a good is called the:A) Law of One Price.B) variable cost.C) marginal cost.D) fixed cost.Answer: C)...
The Nike iD program is an example of which of the following marketing techniques?
The Nike iD program is an example of which of the following marketing techniques?A) customer co-productionB) transactive contentC) price discriminationD)...
All of the following are among those most frequently affected by ad-blocking except:
All of the following are among those most frequently affected by ad-blocking except:A) gaming sites.B) newsgroup/forums.C) social network sites.D) online...
All of the following are "traditional" online marketing tools except:
All of the following are "traditional" online marketing tools except:A) affiliate marketing.B) e-mail and permission marketing.C) social marketing.D)...
Which of the following is the most important tool in establishing a relationship with the customer?
Which of the following is the most important tool in establishing a relationship with the customer?A) company websiteB) company CRM systemC) FacebookD)...
Which of the following statements about Canada's anti-spam law is not true?
Which of the following statements about Canada's anti-spam law is not true?A) Canada's law is based on an opt-in model.B) The law has no impact on companies...
Which of the following statements about CAN-SPAM is not true?
Which of the following statements about CAN-SPAM is not true?A) CAN-SPAM went into effect in January 2004.B) CAN-SPAM prohibits unsolicited e-mail (spam).C)...
The percentage of all e-mail that is spam averaged around ________% in 2016.
The percentage of all e-mail that is spam averaged around ________% in 2016.A) 53B) 63C) 73D) 83Answer: A)...
Which of the following is not a primary source of ad fraud?
Which of the following is not a primary source of ad fraud?A) browser extensions that insert ads into a premium publisher's website and then list the...
Ad blockers operate in a manner similar to which of the following?
Ad blockers operate in a manner similar to which of the following?A) anti-virus softwareB) firewallsC) Flash cookiesD) anonymous browsingAnswer: B)...
Amazon's Associates program is an example of which of the following?
Amazon's Associates program is an example of which of the following?A) viral marketingB) local marketingC) affiliate marketingD) lead generation marketingAnswer: C)...
Which of the following is not a practice that degrades the results and usefulness of search engines?
Which of the following is not a practice that degrades the results and usefulness of search engines?A) social searchB) link farmsC) content farmsD) click...
Which of the following is not true about search engine advertising?
Which of the following is not true about search engine advertising?A) Spending on search engine advertising constitutes over 45% of all online advertising...
Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word?
Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word?A) PandaB)...
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?A) Nielsen ratingsB) data collected from social...
Which of the following forms of online advertising is expected to grow the fastest between 2016 and 2020?
Which of the following forms of online advertising is expected to grow the fastest between 2016 and 2020?A) paid searchB) sponsorshipsC) search enginesD)...
Google introduced ________ to its search algorithm to weed out low-quality sites from search results.
Google introduced ________ to its search algorithm to weed out low-quality sites from search results.A) PenguinB) HummingbirdC) PandaD) Knowledge GraphAnswer: C)...
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
In modeling online consumer behavior, the concept of "consumer skills" refers to the:A) education level of the consumer.B) communication skills of the...
Online buyers constitute approximately ________% of the online Internet audience.
Online buyers constitute approximately ________% of the online Internet audience.A) 67B) 77C) 87D) 97Answer: B)...
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:A)...
In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education?
In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education?A) 25%B) 33%C) 66%D) 75%Answer: C)...
Which of the following is not one of the main stages of the online purchasing process?
Which of the following is not one of the main stages of the online purchasing process?A) post-purchase service and loyaltyB) awarenessC) engagementD)...
Which of the following online advertising formats involved the least amount of spending in 2016?
Which of the following online advertising formats involved the least amount of spending in 2016?A) searchB) classifiedsC) rich mediaD) e-mailAnswer: D)...
Around ________% of households in the United States have broadband access to the Internet.
Around ________% of households in the United States have broadband access to the Internet.A) 45B) 55C) 75D) 85Answer: C)...
In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.
In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.A) less than 10%; less than 25%B)...
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?A)...
Linden Dollars, created for use in Second Life, are an example of:
Linden Dollars, created for use in Second Life, are an example of:A) digital cash.B) virtual currency.C) EBPP.D) peer-to-peer payment systems.Answer: B)...
All of the following are limitations of the existing online credit card payment system except:
All of the following are limitations of the existing online credit card payment system except:A) poor security.B) cost to consumers.C) cost to merchant.D)...
Which of the following is not a major trend in e-commerce payments in 2016-2017?
Which of the following is not a major trend in e-commerce payments in 2016-2017?A) Mobile retail payment volume decreases.B) PayPal remains the most popular...
PCI-DSS is a standard established by which of the following?
PCI-DSS is a standard established by which of the following?A) the banking industryB) the credit card industryC) the federal governmentD) the retail industryAnswer: B)...
PayPal is an example of a(n):
PayPal is an example of a(n):A) online stored value payment system.B) digital checking system.C) accumulating balance system.D) digital credit card system.Answer: A)...
All of the following statements about Apple Pay are true except which of the following?
All of the following statements about Apple Pay are true except which of the following?A) Apple Pay is subject to recent regulations issued by the Bureau...
All of the following are examples of social/mobile peer-to-peer payment systems except:
All of the following are examples of social/mobile peer-to-peer payment systems except:A) Venmo.B) Bill Me Later.C) Square Cash.D) Google Wallet.Answer: B)...
Which of the following statements is not true?
Which of the following statements is not true?A) Most states require companies that maintain personal data on their residents to publicly disclose when...
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:A)...
What is the first step in developing an e-commerce security plan?
What is the first step in developing an e-commerce security plan?A) Create a security organization.B) Develop a security policy.C) Perform a risk assessment.D)...
Which of the following is the most common protocol for securing a digital channel of communication?
Which of the following is the most common protocol for securing a digital channel of communication?A) DESB) SSL/TLSC) VPND) HTTPAnswer: B) SSL/...
A fingerprint scan is an example of which of the following?
A fingerprint scan is an example of which of the following?A) biometricsB) encryptionC) IDSD) firewallAnswer: A) biometr...
Which of the following statements is not true?
Which of the following statements is not true?A) Apple's Touch ID stores a user's actual fingerprint.B) Biometric devices reduce the opportunity for spoofing.C)...
Which of the following statements is not true?
Which of the following statements is not true?A) A VPN provides both confidentiality and integrity.B) A VPN uses both authentication and encryption.C)...
Which of the following is not an example of an access control?
Which of the following is not an example of an access control?A) firewallsB) proxy serversC) digital signaturesD) login passwordsAnswer: C) digital...
An intrusion detection system can perform all of the following functions except:
An intrusion detection system can perform all of the following functions except:A) examining network traffic.B) setting off an alarm when suspicious activity...
All of the following are used for authentication except:
All of the following are used for authentication except:A) digital signatures.B) certificates of authority.C) biometric devices.D) packet filters.Answer: D)...
Proxy servers are also known as:
Proxy servers are also known as:A) firewalls.B) application gateways.C) dual home systems.D) packet filters.Answer: C) dual home syst...
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.A) firewallB) virtual private...
All of the following are methods of securing channels of communication except:
All of the following are methods of securing channels of communication except:A) SSL/TLS.B) certificates.C) VPN.D) FTP.Answer: D) ...
Which of the following dimensions of e-commerce security does not involve encryption?
Which of the following dimensions of e-commerce security does not involve encryption?A) confidentialityB) availabilityC) message integrityD) nonrepudiationAnswer: B)...
A digital certificate contains all of the following except the:
A digital certificate contains all of the following except the:A) subject's private key.B) subject's public key.C) digital signature of the certification...
All of the following statements about PKI are true except:
All of the following statements about PKI are true except:A) the term PKI refers to the certification authorities and digital certificate procedures that...
______ is the current standard used to protect Wi-Fi networks.
______ is the current standard used to protect Wi-Fi networks.A) WEPB) TLSC) WPA2D) WPA3Answer: C) W...
All of the following statements about public key cryptography are true except:
All of the following statements about public key cryptography are true except:A) public key cryptography uses two mathematically related digital keys.B)...
The Data Encryption Standard uses a(n) ________-bit key.
The Data Encryption Standard uses a(n) ________-bit key.A) 8B) 56C) 256D) 512Answer: B)...
All the following statements about symmetric key cryptography are true except:
All the following statements about symmetric key cryptography are true except:A) in symmetric key cryptography, both the sender and the receiver use the...
Symmetric key cryptography is also known as:
Symmetric key cryptography is also known as:A) public key cryptography.B) secret key cryptography.C) PGP.D) PKI.Answer: B) secret key cryptogra...
Next generation firewalls provide all of the following except:
Next generation firewalls provide all of the following except:A) an application-centric approach to firewall control.B) the ability to identify applications...
_______ typically attack governments, organizations, and sometimes individuals for political purposes.
_______ typically attack governments, organizations, and sometimes individuals for political purposes.A) CrackersB) White hatsC) Grey hatsD) HacktivistsAnswer: D)...
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?A) malicious insidersB) malicious...
Shellshock is an example of which of the following?
Shellshock is an example of which of the following?A) mobile malwareB) software vulnerabilityC) botnetD) Trojan horseAnswer: B) software vulnera...
Automatically redirecting a web link to a different address is an example of:
Automatically redirecting a web link to a different address is an example of:A) sniffing.B) social engineering.C) pharming.D) DDoS attack.Answer: C)...
Which of the following was designed to cripple Iranian nuclear centrifuges?
Which of the following was designed to cripple Iranian nuclear centrifuges?A) StuxnetB) FlameC) SnakeD) StormAnswer: A) Stux...
Which of the following is not an example of a PUP?
Which of the following is not an example of a PUP?A) adwareB) browser parasiteC) drive-by downloadD) spywareAnswer: C) drive by downl...
Malware that comes with a downloaded file requested by a user is called a:
Malware that comes with a downloaded file requested by a user is called a:A) Trojan horse.B) backdoor.C) drive-by download.D) PUP.Answer: C) drive...
Angler is an example of:
Angler is an example of:A) a worm.B) an exploit kit.C) phishing.D) hacktivism.Answer: B) exploit ...
The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?
The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?A) SQL injection attackB) browser...
______ is not an example of malicious code.
______ is not an example of malicious code.A) ScarewareB) A Trojan horseC) A botD) A snifferAnswer: D) a snif...
Which dimension(s) of security is spoofing a threat to?
Which dimension(s) of security is spoofing a threat to?A) integrityB) availabilityC) integrity and authenticityD) availability and integrityAnswer: C)...
What is the most frequent cause of stolen credit cards and card information today?
What is the most frequent cause of stolen credit cards and card information today?A) lost cardsB) the hacking and looting of corporate servers storing...
In 2016, Yahoo revealed that it had experienced which of the following?
In 2016, Yahoo revealed that it had experienced which of the following?A) a high-profile data breachB) a DDoS attack that shut down its websiteC) a hacktivist...
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:A) spyware.B) a backdoor.C)...
Which of the following is the leading cause of data breaches?
Which of the following is the leading cause of data breaches?A) theft of a computerB) accidental disclosuresC) hackersD) DDoS attacksAnswer: C) ...
Conficker is an example of a:
Conficker is an example of a:A) virus.B) worm.C) Trojan horse.D) botnet.Answer: B) w...
All of the following are prominent hacktivist groups except:
All of the following are prominent hacktivist groups except:A) Anonymous.B) LulzSec.C) Impact Team.D) Avid Life.Answer: D) Avid L...
Accessing data without authorization on Dropbox is an example of which of the following?
Accessing data without authorization on Dropbox is an example of which of the following?A) social network security issueB) cloud security issueC) mobile...
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?A) HTMLB) HTML5C) Adobe FlashD) Adobe AcrobatAnswer: C) Adobe...
The overall rate of online credit card fraud is ________ of all online card transactions.
The overall rate of online credit card fraud is ________ of all online card transactions.A) less than 1%B) around 5%C) around 10%D) around 15%Answer: A)...
Bitcoins are an example of:
Bitcoins are an example of:A) digital cash.B) virtual currency.C) a stored value payment system.D) an EBPP system.Answer: A) digital c...
All of the following experienced high-profile data breaches in 2015 except:
All of the following experienced high-profile data breaches in 2015 except:A) CVS.B) Walgreens.C) Amazon.D) Experian.Answer: C) Ama...
_____ refers to the ability to ensure that messages and data are only available to those authorized to view them.
_____ refers to the ability to ensure that messages and data are only available to those authorized to view them.A) ConfidentialityB) IntegrityC) PrivacyD)...
Which of the following is an example of an online privacy violation?
Which of the following is an example of an online privacy violation?A) your e-mail being read by a hackerB) your online purchasing history being sold...
_______ refers to the ability to ensure that an e-commerce site continues to function as intended.
_______ refers to the ability to ensure that an e-commerce site continues to function as intended.A) NonrepudiationB) AuthenticityC) AvailabilityD) IntegrityAnswer: C)...
Which of the following is an example of an integrity violation of e-commerce security?
Which of the following is an example of an integrity violation of e-commerce security?A) A website is not actually operated by the entity the customer...
______ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
______ refers to the ability to identify the person or entity with whom you are dealing on the Internet.A) NonrepudiationB) AuthenticityC) AvailabilityD)...
_____ refers to the ability to ensure that e-commerce participants do not deny their online actions.
_____ refers to the ability to ensure that e-commerce participants do not deny their online actions.A) NonrepudiationB) AuthenticityC) AvailabilityD)...
Confidentiality is sometimes confused with:
Confidentiality is sometimes confused with:A) privacy.B) authenticity.C) integrity.D) nonrepudiation.Answer: A) priv...
All of the following statements about mobile apps are true except:
All of the following statements about mobile apps are true except:A) the average U.S. consumer now spends more time using mobile apps than watching television.B)...
Snapchat's Lenses feature is an example of which of the following?
Snapchat's Lenses feature is an example of which of the following?A) virtual realityB) artificial intelligenceC) augmented realityD) chatbotAnswer: C)...
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:A) VoIP.B) IPTP.C) VTP.D) IP.Answer: A)...
A(n) ________ allows users to easily add and edit content on a web page.
A(n) ________ allows users to easily add and edit content on a web page.A) wikiB) podcastC) blogD) RSS feedAnswer: A) w...
Which of the following is not a mobile messaging application?
Which of the following is not a mobile messaging application?A) KikB) WhatsAppC) ViberD) FeedlyAnswer: D) Fee...
Which of the following enables Internet users to communicate with each other, although not in real time?
Which of the following enables Internet users to communicate with each other, although not in real time?A) mobile messagingB) online forumC) SMS messagingD)...
Cortana is a type of:
Cortana is a type of:A) intelligent personal assistant.B) widget.C) gadget.D) social network.Answer: A) intelligent personal assist...
All of the following are characteristics of HTML5 except:
All of the following are characteristics of HTML5 except:A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.B) use of...
The concept behind document formatting has its roots in which of the following?
The concept behind document formatting has its roots in which of the following?A) XMLB) SGMLC) HTMLD) GMLAnswer: D) ...
Which of the following is currently the most popular web browser?
Which of the following is currently the most popular web browser?A) Internet ExplorerB) SafariC) ChromeD) FirefoxAnswer: C) Chr...
You could expect to find the following services in a web server software package except:
You could expect to find the following services in a web server software package except:A) security services.B) FTP.C) search engine.D) an RSS aggregator.Answer: D)...
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
In the address http://www.company.com/clients.html, which of the following is the top-level domain?A) .comB) company.comC) wwwD) httpAnswer: A) ...
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:A) Netscape Navigator.B) Mosaic.C)...
What country intends to be the first to use Project Loon to provide universal Internet access?
What country intends to be the first to use Project Loon to provide universal Internet access?A) New ZealandB) Sri LankaC) GhanaD) AustraliaAnswer: B)...
Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?
Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?A) redundancyB) latencyC) Net...
All of the following are involved in the effort to create standards for IoT except:
All of the following are involved in the effort to create standards for IoT except:A) AllSeen Alliance.B) Industrial Internet Consortium.C) Open Connectivity...
Which IEEE 802.11 standard provides for throughput of up to 7 Gbps?
Which IEEE 802.11 standard provides for throughput of up to 7 Gbps?A) 802.11aB) 802.11bC) 802.11acD) 802.11adAnswer: D) 802.1...
The major technologies used with wireless local area networks are:
The major technologies used with wireless local area networks are:A) Wi-Fi and Bluetooth.B) Wi-Fi and WiMax.C) Bluetooth and 3G.D) WiMax and 3G.Answer: A)...
Which of the following statements about fiber-optic cable is not true?
Which of the following statements about fiber-optic cable is not true?A) It transmits more data at faster speeds than coaxial or twisted pair cable.B)...
Which of the following is not a limitation of the current Internet?
Which of the following is not a limitation of the current Internet?A) the continued reliance on cables and wires for connectivityB) limited bandwidth,...
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?A) BluetoothB) dronesC)...
How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?
How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?A) 10 secondsB) 1 minuteC) 10 minutesD) 1 hourAnswer: B) 1 min...
Which of the following is not a concern about IoT?
Which of the following is not a concern about IoT?A) the high cost of sensorsB) interoperabilityC) securityD) privacyAnswer: A) the high cost of...
Internet traffic is predicted to ________ by 2019.
Internet traffic is predicted to ________ by 2019.A) decreaseB) doubleC) tripleD) quadrupleAnswer: C)tri...
Which of the following organizations involved with Internet governance has the United States recently given up control over?
Which of the following organizations involved with Internet governance has the United States recently given up control over?A) ICANNB) IGFC) NTIAD) I...
Which of the following is not true about the mobile platform?
Which of the following is not true about the mobile platform?A) Most smartphones use Intel chips.B) The number of cell phones worldwide exceeds the number...
The ________ helps define the overall structure of the Internet.
The ________ helps define the overall structure of the Internet.A) IABB) IESGC) W3CD) ITUAnswer: A) ...
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.A) Internet...
When talking about the physical elements of the Internet, the term redundancy refers to:
When talking about the physical elements of the Internet, the term redundancy refers to:A) transmitting multiple copies of a single packet to safeguard...
The backbone of the Internet is formed by:
The backbone of the Internet is formed by:A) Internet Exchange Points (IXPs).B) Tier 1 ISPs.C) Network Access Points (NAPs).D) Metropolitan Area Exchanges...
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication...
The Web runs in which layer of Internet architecture?
The Web runs in which layer of Internet architecture?A) Network Technology Substrate layerB) Middleware Services layerC) Transport Services and Representation...
TCP/IP operates in which layer of Internet architecture?
TCP/IP operates in which layer of Internet architecture?A) Network Technology Substrate layerB) Middleware Services layerC) Transport Services and Representation...
Which of the following organizations coordinate the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?
Which of the following organizations coordinate the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?A) IETFB)...
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?A) HTTPB) BGPC) FTPD)...
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?A)...
Which of the following was the original purpose of the Internet?
Which of the following was the original purpose of the Internet?A) to provide a network that would allow businesses to connect with consumersB) to link...
Which of the following are central directories that list all domain names currently in use for specific domains?
Which of the following are central directories that list all domain names currently in use for specific domains?A) web serversB) root serversC) client...
Which of the following is not a basic type of cloud computing service?
Which of the following is not a basic type of cloud computing service?A) IaaSB) PaaSC) SaaSD) FiOSAnswer: D)F...
Which of the following is a set of rules for transferring data?
Which of the following is a set of rules for transferring data?A) protocolB) packetC) routerD) IP addressAnswer: A) proto...
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?A)...
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?A)...
_____ is a utility program that allows you to check the connection between your client and a TCP/IP network.
_____ is a utility program that allows you to check the connection between your client and a TCP/IP network.A) PingB) TelnetC) TracertD) FingerAnswer: A)...
_______ is used to allow remote login on another computer.
_______ is used to allow remote login on another computer.A) TelnetB) FTPC) HTTPD) SSLAnswer: A) Tel...
Which of the following statements about cloud computing is not true?
Which of the following statements about cloud computing is not true?A) A public cloud is typically used by companies with stringent privacy and security...
Where does TLS operate within TCP/IP?
Where does TLS operate within TCP/IP?A) between the Internet Layer and the Transport LayerB) between the Transport Layer and the Application LayerC) between...
Which of the following protocols is used to send mail to a server?
Which of the following protocols is used to send mail to a server?A) IMAPB) FTPC) HTTPD) SSLAnswer: A) I...
________ is a model of computing in that computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet.
________ is a model of computing in that computer processing, storage, software, and other services are provided as a shared pool of virtualized resources...
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
Which of the following is not an advantage of client/server computing over centralized mainframe computing?A) It is easy to expand capacity by adding...
The address used by a browser to identify the location of content on the Web is called:
The address used by a browser to identify the location of content on the Web is called:A) a domain name.B) a uniform resource locator.C) an IP address.D)...
The ________ allows a natural language expression, such as Google.com, to represent a numeric IP address.
The ________ allows a natural language expression, such as Google.com, to represent a numeric IP address.A) uniform resource locator systemB) Internet...
An IPv4 address is expressed as a:
An IPv4 address is expressed as a:A) 32-bit number that appears as a series of four separate numbers separated by semicolons.B) 64-bit number that appears...
The Internet Layer of TCP/IP is responsible for which of the following?
The Internet Layer of TCP/IP is responsible for which of the following?A) placing packets on and receiving them from the network mediumB) addressing,...
The Transport Layer of TCP/IP is responsible for which of the following?
The Transport Layer of TCP/IP is responsible for which of the following?A) placing packets on and receiving them from the network mediumB) addressing,...
Which of the following is the core communications protocol for the Internet?
Which of the following is the core communications protocol for the Internet?A) TelnetB) FTPC) TCP/IPD) TLSAnswer: C) TCP...
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them...
Which of the following is not one of the basic technological foundations of the Internet?
Which of the following is not one of the basic technological foundations of the Internet?A) client/server computingB) FTPC) TCP/IPD) packet switching...
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?A) CommercializationB) InstitutionalC) InnovationD)...
Which of the following occurred during the Commercialization phase of Internet development?
Which of the following occurred during the Commercialization phase of Internet development?A) The fundamental building blocks of the Internet were realized...
During which period of time did the Institutionalization phase of Internet development take place?
During which period of time did the Institutionalization phase of Internet development take place?A) 1950-1960B) 1961-1974C) 1975-1995D) 1995-through...
Which of the following statements is not true?
Which of the following statements is not true?A) No one academic perspective dominates research about e-commerce.B) Economists take a purely technical...
Which of the following is one of the three primary societal issues related to e-commerce?
Which of the following is one of the three primary societal issues related to e-commerce?A) liabilityB) anonymityC) equityD) intellectual propertyAnswer: D)...
Which business application is associated with the technological development of local area networks and client/server computing?
Which business application is associated with the technological development of local area networks and client/server computing?A) transaction automation...
Above all, e-commerce is a ________ phenomenon.
Above all, e-commerce is a ________ phenomenon.A) technology drivenB) finance-drivenC) sociologicalD) government-drivenAnswer: A) technology dri...
All of the following are issues facing Pinterest except:
All of the following are issues facing Pinterest except:A) copyright infringement.B) inability to retain users.C) spam.D) scams.Answer: B) inability...
Which of the following is not an element of friction-free commerce?
Which of the following is not an element of friction-free commerce?A) Information is equally distributed.B) Transaction costs are high.C) Prices can be...
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?A)...
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?A) zoomingB) grazingC) showroomingD)...
Which of the following is an example of an e-commerce first mover that failed?
Which of the following is an example of an e-commerce first mover that failed?A) EtsyB) eToysC) eBayD) E*TradeAnswer: B) Et...
Which of the following statements is not true?
Which of the following statements is not true?A) Information asymmetries are continually being introduced by merchants and marketers.B) Intermediaries...
Which of the following is not true regarding e-commerce today?
Which of the following is not true regarding e-commerce today?A) Economists' visions of a friction-free market have not been realized.B) Consumers are...
Which of the following is a characteristic of the Consolidation phase of e-commerce?
Which of the following is a characteristic of the Consolidation phase of e-commerce?A) predominance of pure online strategiesB) emphasis on revenue growth...
Subscribe to:
Posts (Atom)